{"title":"Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system","authors":"Laiphrakpam Dolendro Singh , Akash Lahoty , Chanubala Devi , Deepjoy Dey , Punyabrat Saikai , Khumukcham Sonam Devi , Khoirom Motilal Singh","doi":"10.1016/j.jisa.2024.103793","DOIUrl":null,"url":null,"abstract":"<div><p>Images play a vital role in almost all sectors, including medical, video conferencing, weather forecasting, military applications, and most common social media applications. Today’s proliferating technology provides attackers an opportunity to breach and access confidential data that are not enciphered or weakly secured. There is a massive requirement for a robust image cryptosystem for the secure transmission of confidential images over an insecure network. Here, we present an encryption technique to encipher images using dynamic substitution boxes (S-boxes) generated by a chaotic system and the points from an elliptic curve over a finite field. The dynamic S-boxes generation depends on a key obtained from the hash value using Secure Hash Algorithm-512 (<span><math><mrow><mi>S</mi><mi>H</mi><mi>A</mi><mn>512</mn></mrow></math></span>). Each different image generates different S-boxes making it immune to known-plaintext attacks. The input image pixels are permuted and substituted using dynamic permutation tables and dynamics S-boxes. The mean of S-box security analyses such as non-linearity, strict avalanche criterion, bit independent criterion, differential approximation probability, and linear approximation is obtained as 104, 0.510294, 0.51145, 0.046875, and 0.083252 respectively. The generated S-boxes using the proposed method meet the standards of secure S-boxes. The cipher output images produced by the proposed methodology are also examined using statistical and security analyses. The proposed method can resist cipher-text-only attacks and has a large keyspace of 512 bits to withstand a probabilistic or deterministic attack on the elliptic curve discrete logarithmic problems such as baby-step, giant-step attack, and Pollard’s rho attack. The strength of the generated cipher image using the proposed method is substantiated by tests such as the National Institute of Standards and Technology randomness test, the local entropy, correlation analysis, and differential analysis. Comparisons are made with some of the related existing state-of-the-art methods and turn out to be on par or better with the other compared methods.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103793"},"PeriodicalIF":3.8000,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624000966","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Images play a vital role in almost all sectors, including medical, video conferencing, weather forecasting, military applications, and most common social media applications. Today’s proliferating technology provides attackers an opportunity to breach and access confidential data that are not enciphered or weakly secured. There is a massive requirement for a robust image cryptosystem for the secure transmission of confidential images over an insecure network. Here, we present an encryption technique to encipher images using dynamic substitution boxes (S-boxes) generated by a chaotic system and the points from an elliptic curve over a finite field. The dynamic S-boxes generation depends on a key obtained from the hash value using Secure Hash Algorithm-512 (). Each different image generates different S-boxes making it immune to known-plaintext attacks. The input image pixels are permuted and substituted using dynamic permutation tables and dynamics S-boxes. The mean of S-box security analyses such as non-linearity, strict avalanche criterion, bit independent criterion, differential approximation probability, and linear approximation is obtained as 104, 0.510294, 0.51145, 0.046875, and 0.083252 respectively. The generated S-boxes using the proposed method meet the standards of secure S-boxes. The cipher output images produced by the proposed methodology are also examined using statistical and security analyses. The proposed method can resist cipher-text-only attacks and has a large keyspace of 512 bits to withstand a probabilistic or deterministic attack on the elliptic curve discrete logarithmic problems such as baby-step, giant-step attack, and Pollard’s rho attack. The strength of the generated cipher image using the proposed method is substantiated by tests such as the National Institute of Standards and Technology randomness test, the local entropy, correlation analysis, and differential analysis. Comparisons are made with some of the related existing state-of-the-art methods and turn out to be on par or better with the other compared methods.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.